"Post" refers to , which are used after you have already gained a session on a target host. These modules are used to gather information, such as passwords or hashes (digital "keys"), from the compromised system. Common uses:
From an active session, use run post/windows/gather/enum_domain to gather domain information. 3. API and License Keys Clave MatSploit
Use modules to search for stored passwords or SSH keys. "Post" refers to , which are used after
Extract sensitive configuration keys from the Windows registry. If you are looking to create a "key"
If you are looking to create a "key" or executable to gain access to a system, use the generate command within the msfconsole . This command allows you to customize a payload with specific encoders and options. Load a payload: use payload/windows/shell_bind_tcp View options: generate -h Generate the code: generate -f exe -o payload.exe 2. Post-Exploitation Modules ( post modules)
© 2011 Customs Today -World's first newspaper on customs. Customs Today.